MAINTAINING FAMILY PRIVACY AND SECURITY IN THE DIGITAL AGE

Authors

  • Aldi Akbar Telkom University
  • Arif Kuswanto Telkom University
  • Budi Rustandi Kartawinata Telkom University

DOI:

https://doi.org/10.62567/jpi.v1i2.877

Keywords:

Digital privacy, Family safety, Education, Digital literacy

Abstract

This activity aims to provide parents and teachers of Pandanwangi PAUD with a basic understanding of the importance of maintaining privacy and security in the use of digital technology, as well as providing practical guidance on how to protect personal information and secure digital devices used by family members. The methods used in this educational activity are lectures, group discussions, and case simulations. The results of this educational activity show that the participants have a better understanding of the importance of maintaining family privacy and security in the digital era, are more aware of the risks in cyberspace and are able to identify and overcome these threats better. The conclusion of this activity is that education about digital privacy and security is very important to be given to the community, especially parents and teachers who have a big role in educating children.

References

Abdelmajid, N. (2023). The Necessity of Cybersecurity for Community Safety the Proposal of the Safe Family Program for Educating the Gulf Arab Community on Information Security for Both Students and Parents. International Journal of Information & Digital Security, 1(1), 20–31.

Adewusi, M. A., Wasiu, A. A., & Odekeye, O. T. (2024). Understanding Online Security Perceptions and Practices: A Qualitative Study. EDUCATIONAL PERSPECTIVES, 13(1).

Afaq, S. A., Husain, M. S., Bello, A., & Sadia, H. (2023). A critical analysis of cyber threats and their global impact. In Computational Intelligent Security in Wireless Communications (pp. 201–220). CRC Press.

Ambashtha, K. L., & Kumar, P. (2023). Online fraud. In Financial Crimes: A Guide to Financial Exploitation in a Digital Age (pp. 97–108). Springer.

Asaad, R. R., & Saeed, V. A. (2022). A Cyber Security Threats, Vulnerability, Challenges and Proposed Solution. Applied Computing Journal, 227–244.

Barnes, R., & Potter, A. (2021). Sharenting and parents’ digital literacy: an agenda for future research. Communication Research and Practice, 7(1), 6–20.

Bhattacharya, M., Roy, S., Chattopadhyay, S., Das, A. K., & Shetty, S. (2023). A comprehensive survey on online social networks security and privacy issues: Threats, machine learning‐based solutions, and open challenges. Security and Privacy, 6(1), e275.

Chopra, S., Kareer, I., Singh, G., & Sharma, R. (2024). PERSPECTIVES OF VARIOUS CYBER SECURITY THREATS AND DEFENSE MECHANISMS IN THE MODERN WORLD. GNA University, Journal of Management & Technology, 15.

Citron, D. K. (2022). The fight for privacy: Protecting dignity, identity and love in the digital age. Random House.

Dedkova, L., Smahel, D., & Just, M. (2022). Digital security in families: the sources of information relate to the active mediation of internet safety and parental internet skills. Behaviour & Information Technology, 41(5), 1052–1064.

DeLiema, M., Burnes, D., & Langton, L. (2021). The financial and psychological impact of identity theft among older adults. Innovation in Aging, 5(4), igab043.

Dixit, V., & Kaur, D. (2024). Development of Two-Factor Authentication to Mitigate Phishing Attack. Journal of Software Engineering and Applications, 17(11), 787–802.

Gupta, S. D., & Kumar, R. (2024). waRLOCK: Countering Ransomware and Data Leak. 2024 IEEE International Conference on Contemporary Computing and Communications (InC4), 1, 1–6.

Huang, L., Zhou, J., Lin, J., & Deng, S. (2022). View analysis of personal information leakage and privacy protection in big data era—based on Q method. Aslib Journal of Information Management, 74(5), 901–927.

Huseynov, E. (2025). Identity Theft. In Computer and Information Security Handbook (pp. 993–1006). Elsevier.

Ibrahim, I. M., Budiman, M., & PS, M. A. (2023). Business and Household Financial Management Through the Utilization of Digital Expertise. Journal Human Resources 24/7. Abdimas: Abdimas, 1(1), 23–30.

Ikpe, K., & Ashigwuike, E. (2025). Enterprise Network Design and Security Optimization. Open Access Library Journal, 12(3), 1–17.

Jain, A. K., Sahoo, S. R., & Kaubiyal, J. (2021). Online social networks security and privacy: comprehensive review and analysis. Complex & Intelligent Systems, 7(5), 2157–2177.

Jubur, M., Shrestha, P., & Saxena, N. (2025). An In-Depth Analysis of Password Managers and Two-Factor Authentication Tools. ACM Computing Surveys, 57(5), 1–32.

Kizza, J. M. (2024). Computer network security protocols. In Guide to Computer Network Security (pp. 409–441). Springer.

LADO, M. J. (2024). Cybersecurity Essentials Protecting Your Digital Life, Data, and Privacy in a Threat-Driven World: Comprehensive Guide to Preventing Hacks, Phishing, Malware, and Identity Theft. Amazon Digital Services LLC-Kdp.

Liu, X. (2025). On the Application of Data Encryption Technology in Computer Network Information Security Protection. International Journal of Management Science Research, 8(4), 38–44.

Nair, M. M., & Tyagi, A. K. (2021). Privacy: History, statistics, policy, laws, preservation and threat analysis. Journal of Information Assurance & Security, 16(1).

Payton, T., & Claypoole, T. (2023). Privacy in the age of Big data: Recognizing threats, defending your rights, and protecting your family. Rowman & Littlefield.

Quach, S., Thaichon, P., Martin, K. D., Weaven, S., & Palmatier, R. W. (2022). Digital technologies: tensions in privacy and data. Journal of the Academy of Marketing Science, 50(6), 1299–1323.

Quayyum, F., & Jaccheri, L. (2025). CyberFamily: A collaborative family game to increase children’s cybersecurity awareness. Entertainment Computing, 52, 100826.

Sihombing, L., Sidharta, V., & Arlena, W. M. (2024). Parental Communication Patterns In Reducing Children’s Dependence On Playing Gadgets. Jurnal Spektrum Komunikasi, 12(4), 556–568.

Udeh, E. O., Amajuoyi, P., Adeusi, K. B., & Scott, A. O. (2024). The role of big data in detecting and preventing financial fraud in digital transactions. World Journal of Advanced Research and Reviews, 22(2), 1746–1760.

Xia, L., Baghaie, S., & Sajadi, S. M. (2024). The digital economy: Challenges and opportunities in the new era of technology and electronic communications. Ain Shams Engineering Journal, 15(2), 102411.

Published

2025-07-30

How to Cite

Akbar, A., Kuswanto, A., & Rustandi Kartawinata, B. (2025). MAINTAINING FAMILY PRIVACY AND SECURITY IN THE DIGITAL AGE. Jurnal Pengabdian Indonesia (JPI), 1(2), 119–125. https://doi.org/10.62567/jpi.v1i2.877

Similar Articles

1 2 > >> 

You may also start an advanced similarity search for this article.